Enhancing Cloud security

Leading SaaS security company deploys SecurityCenter Continuous View to attain the most comprehensive and accurate view of its international, multi-tenant cloud environment.

Read More
Disjointed technologies as biggest challenge facing UK IT security pros

Lack of qualified staff named second biggest challenge with user access and vulnerability management among the top headaches for overworked security teams.

Read More
Hacks proliferate, while financial institutions bank on data protection to limit exposure in the cloud

CipherCloud has released its Q2 2015 Global Cloud Data Security Report. This quarter's report focuses on the strategies of over 50 global companies in banking, investment, wealth management and other areas of financial services used to protect sensitive data in the cloud. The takeaways provide...

Read More
Imation Lock & Key solution provides new levels of data security  

Lock & Key is a component of Imation’s recently announced Secure Data Movement...

Read More
Blue Coat launches Endpoint Alliance Ecosystem

Blue Coat Systems has unveiled its Alliance Ecosystem of Endpoint Detection and Response (EDR)...

Read More
Blue Coat acquires Perspecsys  

Expands portfolio in exploding cloud security market, providing relief for multinational...

Read More
Bidvest Foodservice chooses Fujitsu to overhaul and manage its IT infrastructure

Contract extension sees Fujitsu partner with the food wholesaler to modernise and streamline its IT...

Read More
Gemalto enables service providers to offer trusted crypto in the cloud

Gemalto launches first HSM purpose-built for hardware-based key management in the cloud.

Read More
Exposing hidden threats in encrypted mission-critical enterprise applications

Delivers industry’s first visibility solution that includes stateful SSL decryption to...

Read More
‘Internet of Things’ connected devices to almost triple

New data from Juniper Research has revealed that the number of IoT (Internet of Things) connected...

Read More
Sophisticated cyberattacks are defining the innovation race between adversaries and defenders

Findings underscore the need for retrospective analysis to reduce Time to Detection.

Read More
Sophos research reveals state of IT security in local government organisations

Two thirds of local government organisations adopt a shared services approach to cut IT costs but...

Read More
Firewalls deliver secure, high-speed 802.11ac wireless network performance

Dell’s high-performance wireless network security solutions are easy to install and manage,...

Read More
Retailers fail to obtain potential insight from customer data

Retailers turn away from traditional records management in search of analysis and insight.

Read More

Videos

Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
Dan Evans, Associate Director at Lichfields, discusses the results of the company’s recent data centre study, which finds that, for developers, Scotland offers something few regions or countries can match -...
Dor Eisner, Co-Founder and CEO of Guardz, shares insights from the latest Cybersecurity SMB Report. He discusses the evolving threat landscape, including the impact of AI and automation, and why smaller...
Work AI leader Glean has launched the Work AI Institute, a first-of-its-kind research initiative - supported by faculty from Stanford, Harvard, Berkeley, Notre Dame, and others - dedicated to decoding what...

Expert Opinions

By Mark Daley, Director of Digital Strategy and Business Development, Epsilon Telecommunications.
By Nadir Merchant, General Manager, IT Operations Suite, Kaseya.